Summary
Acunetix 360 detected that one of following CSP directives is used:
- unsafe-eval
- unsafe-inline
By using unsafe-eval, you allow the use of string evaluation functions like eval.
By using unsafe-inline, you allow the execution of inline scripts, which almost defeats the purpose of CSP. When this is allowed, it's very easy to successfully exploit a Cross-site Scripting vulnerability on your website.
Impact
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully.
Remediation
If possible remove unsafe-eval and unsafe-inline from your CSP directives.